Building AI-Based Cybersecurity Pipelines Training
Commitment | 1 Day, 7-8 hours a day. |
Language | English |
User Ratings | Average User Rating 4.8 See what learners said |
Price | REQUEST |
Delivery Options | Instructor-Led Onsite, Online, and Classroom Live |
COURSE OVERVIEW
Building AI-Based Cybersecurity Pipelines Training aims to better understand all the users and activities across your network so that you can identify which transactions are typical and which are potentially nefarious. Traditional cybersecurity methods include creating barriers around your infrastructure to protect it from intruders. However, as enterprises transform digitally, they face a proliferation of devices, more sophisticated cybersecurity attacks, and an incredibly vast network of data to protect—which means new cybersecurity methodologies must be explored. An alternative approach is to address cybersecurity as a data science problem:
Please note that once a booking has been confirmed, it is non-refundable. This means that after you have confirmed your seat for an event, it cannot be canceled, and no refund will be issued, regardless of attendance.
WHAT'S INCLUDED?
- 1 day of Building AI-Based Cybersecurity Pipelines Training with an expert instructor
- Building AI-Based Cybersecurity Pipelines Electronic Course Guide
- Certificate of Completion
- 100% Satisfaction Guarantee
RESOURCES
- Building AI-Based Cybersecurity Pipelines – https://www.wiley.com/
- Building AI-Based Cybersecurity Pipelines – https://www.packtpub.com/
- Building AI-Based Cybersecurity Pipelines – https://store.logicaloperations.com/
- Building AI-Based Cybersecurity Pipelines – https://us.artechhouse.com/
- Building AI-Based Cybersecurity Pipelines Training – https://www.amazon.com/
RELATED COURSES
- Applications of AI for Anomaly Detection Training
- Data Parallelism: How to Train Deep Learning Models on Multiple GPUs Training
- Fundamentals of Deep Learning Training
- Building Conversational AI Applications Training
- Applications of AI for Predictive Maintenance Training
- Model Parallelism: Building and Deploying Large Neural Networks Training
- Building Transformer-Based Natural Language Processing Applications Training
- Computer Vision for Industrial Inspection Training
- Building AI-Based Cybersecurity Pipelines Training
ADDITIONAL INFORMATION
COURSE OBJECTIVES
Upon completion of this Building AI-Based Cybersecurity Pipelines Training course, participants can:
- Build Morpheus pipelines to process and perform AI-based inference on massive amounts of data for cybersecurity use cases in real time
- Utilize several AI models with a variety of data input types for tasks like sensitive information detection, anomalous behavior profiling, and digital fingerprinting
- Leverage key components of the Morpheus AI framework, including the Morpheus SDK and command-line interface (CLI), and NVIDIA Triton™ Inference Server
CUSTOMIZE IT
- We can adapt this Building AI-Based Cybersecurity Pipelines Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Building AI-Based Cybersecurity Pipelines course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Building AI-Based Cybersecurity Pipelines course around the mix of technologies of interest to you (including technologies other than those in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policymaker), and present the Building AI-Based Cybersecurity Pipelines Training course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this Building AI-Based Cybersecurity Pipelines Training course:
- ALL
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this Building AI-Based Cybersecurity Pipelines Training course are:
- Familiarity with defensive cybersecurity themes
- Professional data science and/or data analysis experience
- Competency with the Python programming language
- Competency with the Linux command line
COURSE SYLLABUS
Introduction
- Meet the instructor.
- Create an account at courses.nvidia.com/join
An Overview of the NVIDIA Morpheus AI Framework
- Explore the fundamental mechanics and tools involved in successfully training deep neural networks:
- Understand the need for AI-based cybersecurity.
- Learn about the components of the Morpheus framework.
- Discover how institutions are building solutions with Morpheus.
Morpheus Pipeline Construction
- Get an overview of the Morpheus SDK and CLI.
- Learn about pipeline types and commands.
- Learn about data input/output (IO) and processing.
Inference in Morpheus Pipelines
- Get an overview of NVIDIA Triton Inference Server.
- Understand how models are deployed.
- Explore a sensitive-information-detection pipeline.
Case Study: AI-Based Machine Logs Parsing at Splunk
- Apply your understanding to a real-world example.
Digital Fingerprinting Pipeline
- Use the Morpheus autoencoder pipeline.
- Discover compromised credentials.
Time Series Analysis
- Apply time series analysis within a Morpheus pipeline.
- Combine time series analysis with digital fingerprinting.
Case Study: Cybersecurity Flyaway Kit at Booz Allen Hamilton
- Apply your understanding to a real-world example.
Assessment 1: Test Your Understanding
- Assess your conceptual understanding of the topics covered.
Assessment 2: Practical Demonstration
- Build an end-to-end Morpheus pipeline to identify a cybersecurity breach.
Wrap Up
- Get resources for further development with Morpheus.
- Provide feedback on the workshop.